Analysis
-
max time kernel
94s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
23fad17daff09b22ab9e3f50fab10c00736fcfbb190e1f9d129d7bea95442802.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
23fad17daff09b22ab9e3f50fab10c00736fcfbb190e1f9d129d7bea95442802.dll
Resource
win10v2004-20220901-en
General
-
Target
23fad17daff09b22ab9e3f50fab10c00736fcfbb190e1f9d129d7bea95442802.dll
-
Size
788KB
-
MD5
e25ff4a8367608870500bbd6814041fc
-
SHA1
0ca87dc5f2236164ed649f548e4e55f7a387eccd
-
SHA256
23fad17daff09b22ab9e3f50fab10c00736fcfbb190e1f9d129d7bea95442802
-
SHA512
eccd72e4fdd49a86918270f3844f92f500a21aaeecf6e70a8855f944fbcbf357b3b32db49c315fa4ea350ea6a57e14fa7d84d4c782c90c6d7fafc448050f1fe4
-
SSDEEP
12288:anEVDf7aXy7X9sOEGldiJDyNHnY6ddlTwW:aaDai7NstGri4Y6XlTwW
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1236 rundll32.exe 1236 rundll32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe 1236 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3604 wrote to memory of 1236 3604 rundll32.exe 83 PID 3604 wrote to memory of 1236 3604 rundll32.exe 83 PID 3604 wrote to memory of 1236 3604 rundll32.exe 83 PID 1236 wrote to memory of 3392 1236 rundll32.exe 85 PID 1236 wrote to memory of 3392 1236 rundll32.exe 85 PID 1236 wrote to memory of 3392 1236 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\23fad17daff09b22ab9e3f50fab10c00736fcfbb190e1f9d129d7bea95442802.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\23fad17daff09b22ab9e3f50fab10c00736fcfbb190e1f9d129d7bea95442802.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe shimgvw.dll,ImageView_Fullscreen C:\Windows\SysWOW64\2011.jpg3⤵PID:3392
-
-